PT-2023-8454 · Systemd+7 · Systemd-Resolved+7
Agentoak
·
Published
2022-12-08
·
Updated
2025-11-11
·
CVE-2023-7008
CVSS v3.1
5.9
Medium
| AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N |
Name of the Vulnerable Software and Affected Versions
systemd-resolved (affected versions not specified)
Description
The issue is related to insufficient authentication checks of messages from DNS clients in the systemd-resolved service, which manages network connections and domain name resolutions. This may allow a remote attacker to modify DNS records protected by DNSSEC by sending specially crafted DNS requests. The vulnerability can also enable man-in-the-middle attackers or the upstream DNS resolver to manipulate records of DNSSEC-signed domains, even when these records lack a signature.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Alt Linux
Almalinux
Centos
Red Hat
Red Os
Rocky Linux
Suse
Systemd-Resolved